What your Bluetooth devices reveal
Early Bluetooth “people watching” & bluejacking
- Several recalled early-2000s habits: scanning for nearby devices on trains or in malls, matching device names to people, and even pranking (e.g., pushing calendar alarms, sending unsolicited files/“bluejacking”).
- Custom device names were common and often highly identifying; some still play with joke names (fake police vans, dictators, sex toys, etc.).
Retail spam, ads, and traffic monitoring
- People describe malls and shops blasting unsolicited Bluetooth file-transfer prompts, sometimes abused for malware, which pushed users to turn BT off.
- Multiple comments confirm commercial tracking: malls, department stores, grocery chains, airports, and car dealerships use WiFi/Bluetooth to measure dwell time, movement patterns, and repeat visits, sometimes linked to loyalty apps or campaigns.
- Bluetooth and toll transponder IDs are used by road authorities to infer traffic speeds; similar systems exist in several regions and at festivals.
- Some note EU rules supposedly forbid individual tracking, but others say it still happens under “anonymized” or safety pretexts.
Home and neighborhood fingerprinting
- HomeAssistant and similar tools easily log neighbors’ devices and presence (including Bluetooth toothbrushes), unintentionally exposing routines.
- Simple setups (ESP32, Pi) could correlate MACs with faces at a front door and profile visitors over time.
Cars, TPMS, and other radios
- Car WiFi/BT SSIDs often reveal owner and model; wardriving apps show this at scale.
- Tire pressure sensors and even RFID-tagged tires broadcast unique identifiers useful for vehicle tracking, though some argue plates and CCTV already dominate.
Medical, IoT, and wearables
- Examples include pacemakers, CPAP machines, water meters, and sex toys broadcasting via BLE.
- Debate over design tradeoffs: broadcast-only radios can save power and reduce attack surface, but still leak metadata; others argue for NFC-style activation or better encryption despite cost pressures.
MAC randomization and technical limits
- Bluetooth has “resolvable private addresses” and phones/WiFi now often randomize MACs, but commenters note:
- Rotation can be correlated over time,
- Device types and traffic patterns still fingerprint users, and
- Many accessories use static IDs.
User countermeasures and OS behavior
- Some keep BT/WiFi off and only enable when needed, citing both privacy and battery gains (especially since “Find My”-style networks piggyback on BT).
- GrapheneOS can auto-disable radios after inactivity; iOS and Android have partial/hidden behaviors (Control Center only “disconnects,” auto-reenable at set times/locations).
- People share shortcuts/automation (“store mode”) to kill radios before entering shops.
Threat models, art, and ethics
- Speculative uses include burglar tools that log presence/absence, and art installations that confront passersby with their historical visits or purchased data.
- Some argue Bluetooth tracking is just another form of public observation; others stress the qualitative shift from casual noticing to scalable, automated, long-term surveillance.
Meta: skepticism about the article
- Multiple commenters call the blog post “LLM slop,” criticizing its tone (“problem nobody talks about,” “not a hacking tool”) and presentation as derivative of other indie blogs.